You carry a lot of data and sensitive information on your laptop, tablet, and smartphone. The standard method of protecting that information from prying eyes is to encrypt it, rendering the data inaccessible. But with most encryption software, that information becomes accessible the moment you log in to the device as a matter of convenience.
Think about what information that might be: names, postal and email addresses, and phone numbers for friends, family, clients, and business associates; calendar events indicating where you'll be and when you'll be there; personal photographs; and more. You might also have proprietary information about your company, clients, information that companies have entrusted you under the terms of non-disclosure agreements, and other sensitive information that should be secured.
Encryption basically scrambles the data so it's nothing but unusable gibberish to anyone who isn't authorized to access or view it.
And that's great, but ask yourself this: How many steps must you go through to decrypt your data? Encryption is designed to protect data, but it should also be seamlessly accessible to the user—it should automatically decrypt, so you don't have to jump through hoops to use your own encrypted data. And that means it's not protected at all if someone finds your laptop, smartphone, or tablet in a state that doesn't require a log-in password.
Using a Passcode
The Department of Justice and the National Security Administration—the same NSA that allegedly has omnipotent access to all data everywhere—have expressed frustration over iOS 6 and declared its encryption to be virtually impenetrable. There is a way to bypass it, but only Apple knows the magic trick, and there's a massive backlog of requests from law enforcement.
There is also a general layer of encryption in iOS that functions purely as a means of remotely wiping the device running it. Rather than literally erasing all of the data—which would take a little time depending on how much data there is—this remote wipe tool simply resets the encryption key, instantly rendering the data useless. That's handy, but it's not foolproof.
iOS devices also have hardware-based encryption that protects your data, including your email and its attachments. That encryption, however, is tied to a passcode, meaning you must actually assign and use a passcode for your iOS device in order for your data to be protected.
The BitLocker encryption in Microsoft Windows works along the same lines. The TPM (Trusted Platform Module) chip provides a hardware-based element, and the user login provides the key to unlock the encryption and make the data available to the user.
All popular encryption tools lock data from unauthorized access, but are designed to unlock when a user successfully logs in. The data is then available as if it weren't encrypted at all, and the user doesn't have to take any additional steps to access or use the encrypted information.
Sign up for Computerworld eNewsletters.